Professional Documents
Culture Documents
Business Challenge
PCI compliance is mandatory for airlines, extending to all system com-
ponents included in or connected to the cardholder data environment.
For airlines, this extends from the point of acceptance to any customer
service application holding or using cardholder data. It is the card data
acquirer’s responsibility to impose compliance on its airline merchants.
The airline is therefore responsible for the security of each of its distribu-
tion channels, whether the system elements are internal or external.
Offsetting the value of PCI compliance, however, are some related chal-
lenges. These include the substantial effort and investment required to
achieve compliance in the first place, along with the unfortunate reality
that compliance does not necessarily translate to adequate defense
against advanced cyberattacks.
1. https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-1.pdf
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 1
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Traditional Approaches
A flat network casts a wide scope of compliance. Organizations that do not isolate their payment devices, such as point-
of-sale devices, credit card-processing workstations and servers, typically face more challenges during periodic compliance
assessments than those that segment said devices. Any network segment that processes or transmits unencrypted credit
card information must meet all PCI DSS requirements. In a flat, unsegmented network, the entire network is in scope for
the PCI DSS.
VLANs were designed for traffic management, not security. Your Qualified Security Assessor, or QSA, will likely agree that
VLANs and ACLs do not provide the necessary security controls to meet PCI DSS requirements and are extremely difficult to
manage at enterprise scale. VLANs alone are not capable of enforcing the control of privileged information.
Alternative security options, such as legacy port-based firewalls, also fail in this regard because they are indiscriminate about
the traffic that is allowed through and do not provide the necessary visibility or control over the actions of a segment’s users.
For example, there is no way to determine which applications are being used, which data is being accessed, or if specific
users are allowed to access a particular segment in the first place.
It is not sufficient to merely meet PCI DSS requirements. The PCI DSS itself states that it provides “a baseline of technical
and operational requirements” for protecting cardholder data. The specified countermeasures represent only a minimum
standard of due care, and because of the now three-year period between revisions, they often lag behind significant changes
in the technology and threat landscapes.
One self-acknowledged example of this can be found in the requirement to “deploy anti-virus software on all systems
commonly affected by malicious software (particularly personal computers and servers)” in PCI DSS section 5.1. In this case,
the standard explicitly mentions the consideration of “additional anti-malware solutions … as a supplement to the anti-virus
software,” presumably in recognition of the poor track record such software has when it comes to stopping modern, poly-
morphic malware and zero-day exploits.
A second example comes from the requirement to “implement stateful inspection” technology as part of the solution to
“prohibit direct public access between the internet and any system component in the cardholder data environment” in
PCI DSS section 1.3.6. Commentary by Verizon® on this requirement says it all: “The DSS still specifies stateful-inspection
firewalls, first launched in 1994. As the threats to the CDE become more complex, these devices are less able to identify all
unauthorized traffic and often get overloaded with thousands of out-of-date rules. To address this, vendors are now offering
‘next generation’ firewalls that can validate the traffic at layers 2 to 7, potentially allowing far greater levels of granularity in
the rules.”2
Specific examples aside, the key point to realize here is that it’s typically necessary for security and compliance teams to go
above and beyond PCI DSS requirements to establish security architectures that more effectively address modern threats
and more closely align with their organizations’ risk tolerance.
2. http://www.verizonenterprise.com/pcireport/2015/
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 2
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
r
s e
er ld
er ld
rv ho
rv ho
Se ard
Se ard
e
ur
C
C
s ct
er ru
rv st
Se fra
e
ur
t
In
en
rs ce
s ct
se n
s m
er ru
U ina
er p
rv st
rv elo
Se fra
Se ev
In
s
on
D
ta r
ks se
ti
or U
W nd
t
en
E
s m
er p
or o
rv elo
w lt
ks
et A
Se ev
N alo
D
P
e
on
IZ
C
P
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 3
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
POS PC: PCs or registers used as points of sale may Laptop/Office PC: Mobile wireless laptops used
be considered in scope. in departments that do not process credit card
numbers are usually considered out of scope.
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 4
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Reference Architecture
The PCI reference architecture below outlines recommended zones of isolation for merchants, regardless of the size of the organiza-
tion. Security zones are logical containers for physical interfaces, VLANs, IP address ranges or a combination thereof. The switch and
next-generation firewall icons in the diagram indicate the flexibility of using one, the other or a combination to enforce isolation all the
way to the Ethernet jack/access point.
ZONE: Voice
Next-Generation
Firewall
Router
Data Center/WAN
Implementation Overview
Products required:
• Palo Alto Networks Next-Generation Firewall
• Threat Prevention subscription
• WildFire subscription
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 5
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
r
s e
er ld
rv ho
Se ard
C
e
ur
rs ce
s ct
se n
er ru
U ina
rv st
F
Se fra
In
t
en
s m
er p
or o
rv elo
w lt
ks
et A
Se ev
N alo
D
P
e
on
IZ
C
P
Figure 4: Segmented network with Palo Alto Networks isolates cardholder data
Figure 5 shows the options available when you select “Create a Zone.” You need to associate the zone with at least one interface, and
select the “Zone Protection Profile” and “Log Setting” options. If you want to restrict or block access to the zone by IP ranges, you can
complete the ACL options on the right side.
Once you’ve created your PCI zone, you need to define rules to allow/block access to it. Figure 5 shows an example of how easy it is for
administrators to define straightforward rules to control access to zones.
• The first rule, titled “PCI,” allows users in the “Users” zone who are in the “Finance” Active Directory security group to access the
Oracle® application in the “CC_Servers” zone.
• The second rule blocks any other users from accessing the “CC_Servers” zone and logs them.
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 6
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Figure 6: Example rules to isolate and protect cardholder data in the CC_Servers zone
Figure 7: Creation of two rules to isolate and protect cardholder data in a PCI zone
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 7
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Internal Zone
Non-POS PA-7050
Devices in L3 mode
VL9
0
VL90
PCI Zone
POS Devices VL170
Internet
Distribution Core Switches Edge PA-5050 Public Routers
70 Switches in L3 mode
1
VL
PA-7050
in L3 mode
Figure 8 shows how an airline customer employs next-generation firewalls to isolate its point-of-sale devices from the rest of the
network, reducing the scope of compliance to include only the devices within the PCI zone. The customer uses several other zones to
isolate various devices on the network, but for simplicity, Figure 8 shows only the internal and PCI zones.
The customer’s architecture incorporates two redundant PA-7050 appliances, in Layer 3 mode, hanging off a Cisco® distribution switch.
A PCI zone is configured in the next-generation firewall to include VL170, which contains all the POS devices. The internal zone is
configured in the next-generation firewall to include VL90, which is the primary internal network where non-POS devices connect.
Traffic between the internal and PCI zones is controlled by a PCI security policy defined in PAN-OS®.
Fueling Stations Amazon Web Services Virtual Private Cloud Customer Data Center
Customer’s clients with self-managed IT On Premise
GlobalProtect
Location 2 OSP
GP GP and VM-Series
NGFW in AWS Data collection servers
Windows PC
Central Gateway within customer data center
used to analyze diagnostic
info from OSPs
GlobalProtect
Location 3 OSP Gateway in AWS
Windows PC West Region
Figure 9: Cardholder data isolated from data center with GlobalProtect and VM-Series
The above diagram shows how a provider of fuel management system monitoring services deployed GlobalProtect™ network security
for endpoints and VM-Series virtualized next-generation firewalls on Amazon® Web Services (AWS®) to prevent cardholder data from
entering their own network and, hence, removed their network from the scope of PCI.
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 8
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
The customer monitors underground tanks and lines at thousands of retail fuel stations across the U.S. Using advanced statistical anal-
ysis and system diagnostics, the company ensures the accuracy of all consumption readings and proactively identifies tank systems at
risk of leaks, illegal siphoning or other potentially hazardous situations. The customer installs remote data collection devices – minimally
configured network appliances called “on-site processors” – on each fuel station’s local network. These devices collect data from every
dispenser, tank and line at the station, then transmit it to the customer’s data center for analysis and reporting.
The customer architecture incorporates virtual GlobalProtect gateways in AWS for geographical optimization (one for the east region,
one for the west) and a VM-Series next-generation firewall to block threats and cardholder data from entering the network. By prevent-
ing cardholder data from entering its network, the customer excludes its data center from the scope of PCI compliance.
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 9
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Appendix I
PCI Security Requirements Supported by the Palo Alto Networks Next-Generation Security Platform
The Palo Alto Networks platform supports many of the 300 individual requirements specified in the PCI DSS, as itemized in the
following tables. All references made in this paper to specific requirements are based on PCI DSS version 3.1.
Compliance Capabilities
NEXT-GEN
PCI DSS REQUIREMENT FIREWALL WILDFIRE TRAPS
Requirement 1:
Install and maintain a firewall configuration to protect cardholder data
Requirement 2:
Do not use vendor-supplied defaults for system passwords and other security
parameters
Requirement 3:
Protect stored cardholder data
Requirement 4:
Encrypt transmission of cardholder data across open, public networks
Requirement 5:
Protect all systems against malware and regularly update anti‐virus software or
programs
Requirement 6:
Develop and maintain secure systems and applications
Requirement 7:
Restrict access to cardholder data by business need to know
Requirement 8:
Identify and authenticate access to system components
Requirement 9:
Restrict physical access to cardholder data
Requirement 10:
Track and monitor all access to network resources and cardholder data
Requirement 11:
Regularly test security systems and processes
Requirement 12:
Maintain a security policy that addresses information security for
all personnel
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 10
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
Appendix II
Detailed Descriptions
The Palo Alto Networks platform supports many of the 300 individual requirements specified in the PCI DSS, as itemized in the
following table. All references made in this paper to specific requirements are based on PCI DSS 3.1.
SUPPORTED SUB-
PCI DSS REQUIREMENT REQUIREMENTS DESCRIPTION OF CAPABILITIES
Requirement 1: 1.2, 1.2.1, 1.2.3, 1.3, The Palo Alto Networks portfolio of hardware and virtual next-generation
Install and maintain a firewall 1.3.1, 1.3.2, firewalls enables definitive least-privileged access control (i.e., deny all
configuration to protect 1.3.3, 1.3.4, 1.3.5, applications, users and content except for that which is necessary) for
cardholder data 1.3.6, 1.3.7, all networks involving cardholder data. Palo Alto Networks supports all
1.3.8 sub-requirements pertaining to DMZ implementations intended to
prohibit direct public access between the internet and any CDE system.
Requirement 3: N/A This requirement focuses on reducing the amount of cardholder data
Protect stored cardholder data stored and ensuring that stored data is appropriately masked and
encrypted. Encryption alone does not protect against malware that
scrapes the unencrypted cardholder data from memory. Traps prevents
exploits and malware from launching malicious code that would try to
compromise encryptions keys or cardholder data. If key management
processes do break down, Traps provides an effective compensating
control for PCI DSS Section 3.6.
Requirement 4: 4.1, 4.2 Standards-based IPsec VPNs are supported for secure site-to-site
Encrypt transmission of cardholder connectivity, while GlobalProtect delivers secure remote access for
data across open, public networks individual users via either an TSL or IPsec-protected connection. With its
unique application, user and content identification technologies, the
Next-Generation Security Platform is also able to thoroughly and reliably
control the use of potentially risky end-user messaging technologies (e.g.,
email, instant messaging and chat) down to the level of individual functions
(e.g., allow messages but disallow attachments and file transfers).
Palo Alto Networks | Simplify PCI Compliance With Network Segmentation for Airlines | Use Case 11
USE CASE: Simplify PCI Compliance With Network Segmentation for Airlines
SUPPORTED SUB-
PCI DSS REQUIREMENT REQUIREMENTS DESCRIPTION OF CAPABILITIES
Requirement 7: 7.2, 7.2.1, 7.2.3 Granular, policy-based control over applications, users and content,
Restrict access to cardholder data regardless of the user’s device or location, enables organizations to
by business need to know implement definitive, least-privileged access control that truly limits access
to cardholder data based on business “need to know,” with “deny all” for
everything else. Tight integration with Active Directory and other identity
stores, plus support for role-based access control, enables enforcement of
privileges assigned to individuals based on job classification and function.
Requirement 8: 8.1, 8.1.1, 8.1.3, Native capabilities and tight integration with Active Directory and other
Identify and authenticate access to 8.1.4, 8.1.6, identity stores support a wide range of authentication policies, including
system components 8.1.7, 8.1.8, 8.2, use of unique user IDs, immediate revocation for terminated users, culling
8.2.1, 8.2.3, of inactive accounts, lockout after a specified number of failed login
8.2.4, 8.2.5, 8.3, 8.5, attempts, lockout duration, idle session timeouts, and password reset and
8.6 minimum strength requirements. Support is also provided for several forms
of multi-factor authentication, including tokens and smart cards.
Requirement 10: 10.1, 10.2, 10.2.1, The Next-Generation Security Platform maintains extensive logs/
Track and monitor all access 10.2.2, 10.2.3, audit trails for WildFire, configurations, system changes, alarms, traffic
to network resources and 10.2.4, 10.2.5, 10.2.6, flows, threats, URL filtering, data filtering, and Host Information Profile
cardholder data 10.2.7, 10.3, matches. It also supports daily and periodic review of log data with
10.3.1, 10.3.2, 10.3.3, native, customizable reporting capabilities and the ability to write log
10.3.4, data to a syslog server for archival and analysis by third-party solutions
10.3.5, 10.3.6, 10.4, (including popular security event and information management
10.6, 10.6.1, systems, such as Splunk).
10.6.2, 10.6.3,
Requirement 11: 11.4 The Next-Generation Security Platform fully inspects all allowed
Regularly test security systems communication sessions for threat identification and prevention. A
and processes single, unified threat engine delivers intrusion prevention, stream-
based antivirus prevention, and blocking of unapproved file types
and data. The cloud-based WildFire service extends these capabilities
further by identifying and working in conjunction with on-premise
components to prevent unknown and targeted malware and exploits.
The net result is comprehensive protection from all types of threats in a
single pass of traffic.
3000 Tannery Way © 2017 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of
Santa Clara, CA 95054 Palo Alto Networks. A list of our trademarks can be found at https://www.
Main: +1.408.753.4000 paloaltonetworks.com/company/trademarks.html. All other marks mentioned
Sales: +1.866.320.4788 herein may be trademarks of their respective companies.simplify-pci-compli-
Support: +1.866.898.9087 ance-with-network-segmentation-for-airlines-uc-091817
www.paloaltonetworks.com